Login
Remember me
Register
Getvoice.org
Questions
Unanswered
Tags
Users
Ask a Question
User admic
Wall
Recent activity
All questions
All answers
Ask a Question
Answers by admic
0
votes
What can malicious code do?
answered
Oct 18, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
malicious-code
damage
emergency-management
hacking
0
votes
Which of the following is an appropriate use of Government e-mail?
answered
Oct 18, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
government
email
signature
attachment
hyperlink
0
votes
What are some actions you can take to try to protect your identity?
answered
Oct 18, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
protect
identity
personal
document
credit-card
report
0
votes
What is an indication that malicious code is running on your system?
answered
Oct 18, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
threat-indicator
malicious-code
system
file
0
votes
Which is a risk associated with removable media?
answered
Oct 18, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
risk
media
classified-document
spillage
information
0
votes
What must users do when using removable media within a Sensitive Compartmented Information Facility (SCIF)?
answered
Oct 18, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
media
sensitive
information
scif
management
0
votes
What describes a Sensitive Compartmented Information (SCI) program?
answered
Oct 18, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
sensitive
information
scif
program
0
votes
Which term describes an event where a person who does not have the required clearance or access caveats comes
answered
Oct 18, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
common-terminology
sensitive
information
caveats
0
votes
What is a protection against internet hoaxes?
answered
Oct 18, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
protect
hoax
website
potential-hazards
0
votes
What must you ensure if you work involves the use of different types of smart card security tokens?
answered
Oct 18, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
work
card
security
token
violation
0
votes
When is the best time to post details of your vacation activities on your social networking website?
answered
Oct 18, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
detail
vacation
social-network
media
website
0
votes
Which represents a security best practice when using social networking?
answered
Oct 18, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
represent
security
best-way
social-network
networking
0
votes
What should you do if an individual asks you to let her follow you into your controlled space, stating that
answered
Oct 18, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
individual
control-system
badges
helpdesk
security
0
votes
What are the requirements to be granted access to SCI material?
answered
Oct 18, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
requirement
grant-applicant
scif
access-code
0
votes
What is a good practice when it is necessary to use a password to access a system or an application?
answered
Oct 18, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
good-way
practice
password
system
application
0
votes
Is it acceptable to take a short break while a coworker monitors your computer while logged on with your CAC?
answered
Oct 18, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
break
coworker
computer
cac
workstation
0
votes
What must you ensure before transmitting Personally Identifiable Information (PII) or Protected Health Information (PHI)
answered
Oct 18, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
personal
identification
information
pii
phi
email
0
votes
What must you do when e-mailing Personally Identifiable Information (PII) or Protected Health Information (PHI)?
answered
Oct 18, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
email
personal
identification
information
pii
phi
0
votes
What does Personally Identifiable Information (PII) include?
answered
Oct 18, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
personal
identification
information
pii
security
social-network
0
votes
What is the best example of Protected Health Information (PHI)?
answered
Oct 18, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
best-way
example
protect
information
phi
health-insurance
0
votes
What is the best example of Personally Identifiable Information (PII)?
answered
Oct 18, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
example
personal
identification
information
pii
0
votes
Which of the following terms refers to harm inflicted on national security through authorized access to information
answered
Oct 18, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
common-terminology
security
authorization
access-code
information
0
votes
How many potential insider threat indicators does a person who is playful and charming, consistently win performance
answered
Oct 18, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
insider
threat-indicator
performance
sensitive
information
0
votes
Which is true for protecting classified data?
answered
Oct 18, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
protect
classified-document
data
government
container
0
votes
Under what circumstances could unclassified information be considered a threat to national security?
answered
Oct 18, 2022
in
Internet
internet
internet-quiz
cyber
cyber-awareness
classified-document
threat
security
information
Page:
« prev
1
...
6
7
8
9
10
11
12
...
115
next »
...